Data Exploiter with Security Clearance Law Enforcement & Security - Bethesda, MD at Geebo

Data Exploiter with Security Clearance

Bogart is hiring a Data Exploiter to review, manipulates, triage, and analyze large datasets.
This role is responsible for supporting operational and analytical requirements.
Activities include log analysis, network traffic monitoring, and vulnerability risk assessment.
The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis.
Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination.
KEY RESPONSIBILITIESo Provide data exploitation support to the customero Support Intelligence Report Writers with data exploitation assessmentso Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital datao Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needso Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performanceo Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analystso Provide recommendations for continuous improvemento Work alongside other team members to sustain and advance our organization's capabilitiesEDUCATION AND EXPERIENCEo Bachelor's degree in Computer Science, Information Technology, or other related discipline, or equivalent combination of education, technical certifications, training, and work/military experienceREQUIRED QUALIFICATIONSo Experience conducting network traffic analysiso Prepare a range of tailored products that embody and explain findingso Ability to sift through large amounts of unstructured data for key data points (i.
e.
, metadata and artifacts)o Demonstrated knowledge of incident response, containment, and mitigationo Knowledge of common cyber-attack methodso Ability to triage, review, identify, and correlate items of interest from numerous all sourcedatasetso Ability to evaluate worldwide security events to assess system impact and/or risk (e.
g.
, zero day exploits, hardware failures, and/or cyber-attacks)o Ability to identify and document information that can fill critical gapso Create new methodologies / algorithms for data analysis and correlationo Create entity/object profiles and derived data sets that enable future opportunitieso Experience with the customer's technical collection abilitiesDESIRED QUALIFICATIONSo Strong understanding of VPNs, VLANs, and TCP/IPo Demonstrated experience writing python scriptso Experience with Linux operating systemso Experience with OS hardening using tools such as CIS-CATo Ability to working independently with minimal supervisiono Experience with navigating an enterprise security accreditation processo Experience conducting network traffic analysiso Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system Overview of Bogart AssociatesBogart Associates is a trusted partner within the Intelligence Community.
Our company is committed to providing true mission value to our customers by leveraging strong domain experience, innovation, and industry best practices.
Our engineers have expertise in analytics, Cyber, DevOps, agile development, and cloud engineering to provide our clients with best-of-breed solutions.
Our employee first mantra allows us to hire top talent who feel supported with work/life balance, training, exceptional benefits, and leave.
Not to mention other perks making Bogart a unique place to work.
Outside of our great work, here are 7 reasons you will love being on our team!o Health, Dental, Vision, and Prescription (with no copays or deductibles)o At least 6 weeks PTOo 401k fully vested day one with 6% Matchingo Generous yearly stipend for health and technology related products (gym memberships, massages, laptops, cell phones, meal delivery services, etc.
)o Professional Development reimbursement to attend job-related training, conferences, and certificates and additional PTO for time spent at training (save your PTO for your time!)o Competitive pay o Fun and frequent employee events and family gatherings like lunches, happy hours, movie premieres, theme parks, fishing trips, employee appreciate month, and much more! Recommended Skills Algorithms Assessments Business Process Improvement Computer Networks Corporate Security Customer Demand Planning Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.